This manual introduces the functions and operations of the Event Detection Intelligent Server (hereinafter referred to as "the Server"). Models Device Model DH-IVS-IP8000-E-GU1 DH-IVS-IP8000-2E-GU2, DH-IVS-IP8000-3E-GU2, DH-IVS-IP8000-4E-GU2, DH-IVS- IP8000-5E-GU2, and DH-IVS-IP8000-6E-GU2 Safety Instructions The following signal words might appear in the manual.
User's Manual on these interfaces. About the Manual ● The manual is for reference only. Slight differences might be found between the manual and the product. ● We are not liable for losses incurred due to operating the product in ways that are not in compliance with the manual.
User's Manual Important Safeguards and Warnings This section introduces content covering the proper handling of the device, hazard prevention, and prevention of property damage. Read carefully before using the device, comply with the guidelines when using it, and keep the manual safe for future reference. Transportation Requirements Transport the server under allowed humidity and temperature conditions.
User's Manual Operation Requirements ● This is a class A product. In a domestic environment this may cause radio interference in which case you may be required to take adequate measures. ● The device is heavy and needs to be carried by several persons together to avoid personal injuries.
User's Manual 1 Overview 1.1 Introduction The intelligent event detection server is a device that automatically analyzes video surveillance images and extracts key information from the video source to identify and distinguish objects. It makes judgments based on custom event types and triggers alarms once abnormal behaviors or unexpected events are detected, turning video surveillance from track back after the event to early warning before the event.
Page 9
User's Manual Functions Description ● Store alarm information, including monitoring point, time, detection channel, alarm event type, and alarm event snapshot. Alarm Information ● Search for alarm information by multiple video channels or periods Search (closed intervals). ● Generate a report on all or a selection of the search results. Table 1-2 Description of intelligent analysis Functions Description...
Page 10
User's Manual Functions Description ● Set the detection area as a polygon with an arbitrary shape. ● Set the minimum duration and report interval. Minimum duration: 1 Stay Detection s–60 s; report interval: 1 s–600 s. ● An alarm is triggered when the stay (loitering) duration exceeds the defined time for the specified area.
Page 11
User's Manual Functions Description ● Set the detection area as a polygon with an arbitrary shape. ● An alarm is triggered when suspicious objects are left in key Object Detection detection areas or are moved for longer than the minimum duration time.
Table 1-3 Description of analysis capacities (1) Server Model Description ● 32-channel 1080p real-time video stream analysis. DH-IVS-IP8000-E-GU1 ● Each channel of video can be configured with up to10 identical or different AI rules. Table 1-4 Description of analysis capacities (2) Server...
Page 13
User's Manual Port, panel, or slot Description ● Press to turn on the server and the indicator will switch on. You can quickly locate the server through UID switch and indicator the indicator. ● When the server is enabled, press to disable it. Press and hold it, and the server restores to its factory Reset button settings.
Page 14
User's Manual 1.3.2 2U Front Panel Figure 1-3 Front Panel Table 1-7 Front panel description Port/Indicator Description Power switch. When the server is on, press and hold this button Power button for longer than 4 seconds to turn it off. UID button can be used as an indicator for easy positioning of the server.
Page 15
User's Manual Port/Indicator Description It indicates the HDD read-write status. ● When a RAID card is not installed: ◇ Green indicator flashing: HDD is in the read-write status. ◇ HDD read-write Indicator is off: HDD is not in place or failed. indicator ●...
User's Manual Panel/Port/In Description dicator VGA video output port outputs analog video signals and can be VGA port connected to a monitor to view the local interface of the server. Serial port Connected to the display device for debugging. USB3.0 port Connects to a mouse, keyboard, USB storage device, and more.
User's Manual 2 Cable Connection Prerequisites Check the Server and cables to make sure there is no obvious damage before connecting the device. Also, ensure that all cables are connected properly before powering on the Server. Procedure Step 1 Connect the Server with the VGA display. Step 2 Connect the network cable to the Server.
User's Manual 3 Installing Client Prerequisites ● Windows 7 or Windows 10 is used for software installation. ● The PC resolution must be least 1280 × 800. ● We recommend you disable the computer firewall for normal installation and use of the software. Procedure Step 1 Double-click Intelligent Video Analysis Client Software.exe.
User's Manual 4 Client Operation 4.1 Logging in to Client Double-click on the desktop to open the Behavior Analysis Client. Figure 4-1 Client homepage 4.2 System Configuration View the version, built date, and the open source statement of the client. Select whether to enable Filter Uniform Alarm, which indicates whether uniform alarms are displayed in the real-time alarm column when alarm events occur.
User's Manual Figure 4-2 System configuration Step 2 (Optional) Select Filter Uniform Alarm. If Filter Uniform Alarm is selected, no alarm is displayed in the real-time alarm column when uniformed personnel are detected. If Filter Uniform Alarm is not selected, alarms are displayed in the real-time alarm column when uniformed personnel are detected.
Page 23
User's Manual Figure 4-3 Manage device Step 2 Click Add to configure the parameters. Figure 4-4 Add device Table 4-1 Description of adding device parameters Parameter Description Device Type The type of device to be added. Device Name Enter a name for the server to differentiate it from other servers. Device IP The IP address of device.
Page 24
User's Manual Parameter Description Username Username for logging in to the device. Password Password for logging in to the device. Click OK. Step 3 After the device is added, the client logs in to the device automatically. The login status is Online and the device type is Video Analysis Server, which means successful login.
User's Manual 4.3.2 Managing Remote Devices Manage remote devices and channels. If rules are configured after enabling the smart plan, an alarm will be generated once an event that meets the rules occurs. Procedure Step 1 Add remote devices. 1. Click on the Device Manager page.
Page 26
User's Manual Table 4-2 Parameter description Parameter Description Device Name The name that differentiates a device. Device IP The device IP address. Device Port Port number Username Username and password for logging in to the remote device. Password Manufacturer Select device manufacturer. Select the device type depending on the actual remote device.
Page 27
User's Manual Figure 4-9 Channel Information Step 3 (Optional) Enable intelligent analysis. For channels added for the first time, Enable is selected by default. If the intelligent analysis is not enabled for the channel, the original video can be played but rule configuration and intelligent analysis are not available.
User's Manual 4.4 Intelligent Video Analysis Enable the smart plan and configure rules. You can configure up to 10 AI rules and video quality diagnosis. 4.4.1 Enabling Smart Plan Procedure Step 1 Click Real Monitor on the home page of the client. Right-click a channel to select IVS Config.
User's Manual Related Operations ● Click Import to import the XML file of configured IVS rules. ● Click Export to export the XML file of configured IVS rules. 4.4.2 IVS Rules On the IVS Config page, you can add multiple alarm rules for each channel. You can set rules for the following detection scenarios: Tripwire, intrusion, climbing, getting up, staying (loitering), sleep, people number exception, loudness, fighting, staying alone, crowd gathering, object, call, using mobile phone, fall, running, smoking, sleeping with quilt covering head, head on wall, and video...
Page 30
User's Manual Figure 4-11 Tripwire Step 7 Click Config to configure the parameters and the arming schedule. 1. Click Parameters to configure the parameters. Figure 4-12 Tripwire parameter configuration Table 4-3 configure the parameters Item Description Select the trigger position, including center, left center, top center, right Alarm Position center and bottom center.
User's Manual ● Full-time arming is enabled by default. You can adjust the arming time. ● You can set up to six periods for each day. ● After configuring the arming schedule for one day, you can select other days (one or more) in the Copy section, and then click Copy to copy the configured arming schedule for other days.
Page 32
User's Manual Figure 4-14 Intrusion Step 7 Click Config to configure the parameters and the arming schedule. 1. Click Parameters to configure the parameters.
Page 33
User's Manual Figure 4-15 Parameters Table 4-4 Parameter description Parameter Description Select Is Inside for scenarios when the target stays in the area. You need to set minimum target number, maximum target Is Inside number, minimum duration, and report interval. No need to set direction.
Page 34
User's Manual Parameter Description When an alarm even occurs, and the target remains in the detection area for longer than the defined interval, another Report Interval alarm will be triggered and information on the event will be shown on the screen. (Optional) Feature Enable Identifies police uniforms and yellow vests.
User's Manual 4.4.2.3 Climbing Detection An alarm is triggered when a target climbs up and crosses the drawn climbing line. Step 1 Click Real Monitor on the home page of the client. Step 2 right-click a channel, and then select IVS Config. Step 3 Select the smart plan, and then click Next to go to the IVS page.
User's Manual ● After configuring the arming schedule for one day, you can select other days (one or more) in the Copy section, and then click Copy to copy the configured arming schedule for other days. Figure 4-19 Arming schedule 3.
Page 37
User's Manual according to the prompts. ● You can only draw four points in the bed area. ● The arrow direction of the sleep line is from the head to feet of the target. ● Draw the detection line on the chest of the person. Figure 4-20 Getting up detection Step 6 Click Config to configure the parameters and the arming schedule.
User's Manual Figure 4-22 Arming schedule 3. Click Save. Step 7 Save IVS. ● Click Save to save the IVS configuration and exit the page. ● Click Apply to save the IVS configuration without exiting the page. 4.4.2.5 Staying (Loitering) Detection An alarm is triggered when the target stays in the detection area for longer than the defined time.
Page 39
User's Manual Figure 4-23 Stay Detection Step 6 Click Config to configure the parameters and the arming schedule. 1. Click Parameters to configure the parameters. ● Min Duration: An alarm is triggered when a person stays in the detection area for longer than the defined minimum duration.
User's Manual schedule for other days. Figure 4-25 Arming schedule 3. Click Save. Step 7 Save IVS. ● Click Save to save the IVS configuration and exit the page. ● Click Apply to save the IVS configuration without exiting the page. 4.4.2.6 Sleep Detection An alarm is triggered when a person is detected as staying still or laying down on a table for a long time.
Page 41
User's Manual Figure 4-26 Sleep detection Step 6 Click Config to configure the parameters and the arming schedule. 1. Click Parameters to configure the parameters. Figure 4-27 Parameters...
Page 42
User's Manual Table 4-5 Parameters for sleep detection Parameter Description ● No Moving: If someone does not move or perform an action in the detection area within the defined period, an alarm will be triggered, and the alarm target will move to the position of the person. ●...
User's Manual Step 7 Save IVS. ● Click Save to save the IVS configuration and exit the page. ● Click Apply to save the IVS configuration without exiting the page. 4.4.2.7 Abnormal Number of People Detection Based on the configured rules, an alarm is triggered when the number of people in the detection area does not conform to the configured rules.
Page 44
User's Manual Figure 4-30 Parameter configuration Table 4-6 Parameter configuration Parameter Description An alarm is triggered when the number of people in the detection area Minimum Duration does not conform to the defined value and lasts longer than the minimum duration.
Page 45
User's Manual Parameter Description ● Alarm when equal to threshold: An alarm is triggered when the number of people in the detection area equals to the configured threshold. ● Alarm when not equal to threshold: An alarm is triggered when the number of people in the detection area does not equal to the configured threshold (it is either higher or lower than the threshold).
User's Manual ● Full-time arming is enabled by default. You can adjust the arming time. ● You can set up to six periods for each day. ● After configuring the arming schedule for one day, you can select other days (one or more) in the Copy section, and then click Copy to copy the configured arming schedule for other days.
Page 47
User's Manual Only one abnormal sound detection rule can be configured for each channel. Figure 4-32 Abnormal Sound Detection Step 6 Click Config to configure the parameters and the arming schedule. 1. Click Parameters to configure the parameters. Figure 4-33 Parameters Table 4-7 Parameter description Item Description...
Page 48
User's Manual ● Full-time arming is enabled by default. You can adjust the arming time. ● You can set up to six periods for each day. ● After configuring the arming schedule for one day, you can select other days (one or more) in the Copy section, and then click Copy to copy the configured arming schedule for other days.
User's Manual 4.4.2.9 Fight Detection An alarm is triggered when people are detected to be fighting. ● Fight detection is performance intensive, so make sure to correctly outline the detection area. This will increase its efficiency. ● Fight detection can be used with other rules. ●...
Page 50
User's Manual sensitivity. The higher the sensitivity, the easier it is for the alarms to be triggered. The false alarm rate will also increase. The sensitivity range is 1 to 10. It is 7 by default. Figure 4-36 Fight detection 2.
User's Manual Step 7 Save IVS. ● Click Save to save the IVS configuration and exit the page. ● Click Apply to save the IVS configuration without exiting the page. 4.4.2.10 Staying Alone Detection An alarm is triggered when a person is alone in the detection area for longer than the defined time. Step 1 Click Real Monitor on the home page of the client.
Page 52
User's Manual Figure 4-39 Parameters Table 4-8 Parameters Item Description An alarm will be triggered if a person is staying alone in a detection area Min Duration for longer than the defined value. When an alarm even occurs, and the target remains in the detection area Report Interval for longer than the defined interval, another alarm will be triggered and information on the event will be shown on the screen.
User's Manual 3. Click Save. Step 7 Save IVS. ● Click Save to save the IVS configuration and exit the page. ● Click Apply to save the IVS configuration without exiting the page. 4.4.2.11 Crowd Gathering Detection An alarm is triggered when four or more people gather and stay for longer than the defined time in the detection area.
Page 54
User's Manual Figure 4-41 Crowd gathering detection Step 6 Click Config to configure the parameters and the arming schedule. 1. Click Parameters to configure the parameters. Figure 4-42 Parameters Table 4-9 Parameters Item Description An alarm is triggered when a person stays in the detection area for longer Min Duration than the defined value.
User's Manual Item Description Enter sensitivity. The higher the sensitivity, the easier the alarm is to be triggered. Sensitivity The sensitivity range is from 1 to 10. It is 5 by default. 2. Click Arming schedule to change the arming schedule. ●...
Page 56
User's Manual defined period. Step 1 Click Real Monitor on the home page of the client. Step 2 right-click a channel, and then select IVS Config. Step 3 Select the smart plan, and then click Next to go to the IVS page. Step 4 Click Add rule.
Page 57
User's Manual Figure 4-45 Parameters Table 4-10 Parameters Parameter Description ● Left: an alarm is triggered when an object is left in the detection area for longer than the defined time. Action List ● TakenAway: an object detection alarm is triggered when an object is moved from the detection area and is not moved back within the defined time.
User's Manual Figure 4-46 Arming schedule 3. Click Save. Step 7 Save IVS. ● Click Save to save the IVS configuration and exit the page. ● Click Apply to save the IVS configuration without exiting the page. 4.4.2.13 Call Detection An alarm is triggered when a person makes a phone call in the detection area, and remains on the phone for longer than the defined period.
Page 59
User's Manual Figure 4-47 Call detection Step 6 Click Config to configure the parameters and the arming schedule. 1. Click Parameters to configure the parameters. Figure 4-48 Parameters Table 4-11 Parameters Parameter Description An alarm is triggered when a person makes a phone call in the detection Min Duration area and remains on the phone for longer than the defined time.
User's Manual Parameter Description Set the sensitivity as needed. The higher the sensitivity, the easier it is for the alarm to be triggered. Sensitivity The sensitivity range is 1 to 10, with 5 by default. 2. Click Arming schedule to change the arming schedule. ●...
Page 61
User's Manual defined time. Step 1 Click Real Monitor on the home page of the client. Step 2 right-click a channel, and then select IVS Config. Step 3 Select the smart plan, and then click Next to go to the IVS page. Step 4 Click Add rule.
Page 62
User's Manual Table 4-12 Parameters Parameter Description An alarm is triggered when a person uses their phone in the detection area Min Duration for longer than the defined time. When an alarm even occurs, and the target remains in the detection area for Report Interval longer than the defined interval, another alarm will be triggered and information on the event will be shown on the screen.
User's Manual ● Click Apply to save the IVS configuration without exiting the page. 4.4.2.15 Fall Detection An alarm is triggered when a person falls down or squats in the detection area for longer than the defined time. Step 1 Click Real Monitor on the home page of the client.
Page 64
User's Manual Figure 4-54 Parameters Table 4-13 Parameters Parameter Description An alarm is triggered when a person falls down or squats in the detection Min Duration area for longer than the defined time. When an alarm even occurs, and the target remains in the detection area Report Interval for longer than the defined interval, another alarm will be triggered and information on the event will be shown on the screen.
User's Manual Figure 4-55 Arming schedule 3. Click Save. Step 8 Save IVS. ● Click Save to save the IVS configuration and exit the page. ● Click Apply to save the IVS configuration without exiting the page. 4.4.2.16 Running Detection An alarm is triggered when a person runs fast in the detection area.
Page 66
User's Manual Figure 4-56 Fast run Step 6 Click Config to configure the parameters and the arming schedule. 1. Click Parameters to set the sensitivity as needed. The higher the sensitivity, the easier it is for an alarm to be triggered. The sensitivity range is from 1 to 10.
User's Manual Figure 4-58 Arming schedule 3. Click Save. Step 7 Save IVS. ● Click Save to save the IVS configuration and exit the page. ● Click Apply to save the IVS configuration without exiting the page. 4.4.2.17 Smoking Detection An alarm is triggered when a person smokes in the detection area for longer than the defined time.
Page 68
User's Manual Figure 4-59 Smoking detection Step 6 Click Config to configure the parameters and arming schedule. 1. Click Parameters to configure the parameters. Figure 4-60 Parameters Table 4-14 Parameters Parameter Description An alarm is triggered when a person smokes in the detection area for Min Duration longer than the minimum duration.
Page 69
User's Manual Parameter Description Set the sensitivity as needed. The higher the sensitivity, the easier it is for the alarm to be triggered. Sensitivity The sensitivity range is from 1 to 10. It is 5 by default. 2. Click Arming schedule to change the arming schedule. ●...
User's Manual 4.4.2.18 Sleeping with Quilt Covering Head Detection An alarm is triggered when a person sleeps with their head covered for longer than the defined time. Step 1 Click Real Monitor on the home page of the client. Step 2 right-click a channel, and then select IVS Config.
Page 71
User's Manual Figure 4-63 Parameters Table 4-15 Parameters Parameter Description An alarm is triggered when a person sleeps with their head covered for Min Duration longer than the minimum duration. When an alarm even occurs, and the target remains in the detection area for Report Interval longer than the defined interval, another alarm will be triggered and information on the event will be shown on the screen.
User's Manual Figure 4-64 Arming schedule 3. Click Save. Step 7 Save IVS. ● Click Save to save the IVS configuration and exit the page. ● Click Apply to save the IVS configuration without exiting the page. 4.4.2.19 Posture Detection An alarm is triggered when a person hits the wall repeatedly for longer than the defined time.
Page 73
User's Manual Figure 4-65 Posture detection Step 6 Click Config to configure the parameters and the arming schedule. 1. Click Parameters to configure the parameters. Figure 4-66 Parameters Table 4-16 Parameters Parameter Description Select HitWall. Detection Mode Standing up and running into a wall is included in fast run detection. An alarm is triggered when a person hits the wall repeatedly for longer Min Duration than the minimum duration.
User's Manual Parameter Description When an alarm even occurs, and the target remains in the detection area Report Interval for longer than the defined interval, another alarm will be triggered and information on the event will be shown on the screen. 2.
User's Manual exceeded in the video. Prerequisites Server has been added. For details, see "4.3.1 Adding Devices". Procedure Step 1 On the home page of the client, click Device Manager > Select Enable to enable video quality diagnosis. Step 2 Step 3 Configure the parameters.
Page 76
User's Manual filter out targets that are too small or too large. Target filter is available for tripwire, intrusion, climbing detection, getting up detection, sleep detection, and staying alone detection. Step 1 Click Real Monitor on the home page. Step 2 right-click a channel, and then select IVS Config.
User's Manual Figure 4-70 Draw filter boxes Step 6 Save IVS. ● Click Save to save the IVS configuration and exit the page. ● Click Apply to save the IVS configuration without exiting the page. 4.5 Real-time Monitoring Log in to the server remotely at the client to view the real-time monitoring image. Step 1 Click Real Monitor on the home page.
Page 78
User's Manual Monitoring. indicates that the channel is in live view. indicates that the live view of the channel is not enabled. Intelligent event alarm information is displayed on the right side. Double-click the alarm information to view details. Figure 4-71 Alarm details Right-click a channel and then select IVS Config to enter the IVS page.
User's Manual 4.6 Searching for Alarm Information Search for the alarm event information of channels that are on the event detection server within the defined time. Procedure Step 1 Select Event Query > Step 2 Select a server and channels under it. Step 3 Select Event Type.
Page 80
User's Manual Figure 4-74 Intelligent event details Related Operations ● Select the alarm records as needed, and then click Export Selected to export them to your computer in CSV, Excel or TXT format. Figure 4-75 Alarm ● Click Total Count at the lower-right corner, and then click Export All to export all alarm records to your computer in CSV, Excel or TXT format.
User's Manual Appendix 1 Cybersecurity Recommendations Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks.
Page 82
User's Manual 1024–65535, reducing the risk of outsiders being able to guess which ports you are using. 6. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel. 7. MAC Address Binding We recommend you to bind the IP and MAC address of the gateway to the equipment, thus reducing the risk of ARP spoofing.
Page 83
User's Manual ● Enable IP/MAC address filtering function to limit the range of hosts allowed to access the device. More information Please visit Dahua official website security emergency response center for security announcements and the latest security recommendations.
Need help?
Do you have a question about the DH-IVS-IP8000-E-GU1 and is the answer not in the manual?
Questions and answers